SHA256
1
0
forked from pool/bind
bind/bind-9.16.19.tar.xz.sha512.asc

17 lines
833 B
Plaintext
Raw Normal View History

Accepting request 909186 from home:polslinux:branches:network - Update to 9.16.19 * A race condition could occur where two threads were competing for the same set of key file locks, leading to a deadlock. This has been fixed. [GL #2786] * create_keydata() created an invalid placeholder keydata record upon a refresh failure, which prevented the database of managed keys from subsequently being read back. This has been fixed. [GL #2686] * KASP support was extended with the "check DS" feature. Zones with "dnssec-policy" and "parental-agents" configured now check for DS presence and can perform automatic KSK rollovers. [GL #1126] * Rescheduling a setnsec3param() task when a zone failed to load on startup caused a hang on shutdown. This has been fixed. [GL #2791] * The configuration-checking code failed to account for the inheritance rules of the "dnssec-policy" option. This has been fixed. [GL #2780] * If nsupdate sends an SOA request and receives a REFUSED response, it now fails over to the next available server. [GL #2758] * For UDP messages larger than the path MTU, named now sends an empty response with the TC (TrunCated) bit set. In addition, setting the DF (Don't Fragment) flag on outgoing UDP sockets was re-enabled. [GL #2790] * Views with recursion disabled are now configured with a default cache size of 2 MB unless "max-cache-size" is explicitly set. This prevents cache RBT hash tables from being needlessly preallocated for such views. [GL #2777] * Change 5644 inadvertently introduced a deadlock: when locking the key file mutex for each zone structure in a different view, the "in-view" logic was not considered. This has been fixed. [GL #2783] * Increasing "max-cache-size" for a running named instance (using "rndc reconfig") did not cause the hash tables used by cache databases to be grown accordingly. This has been fixed. [GL #2770] * Signed, insecure delegation responses prepared by named either lacked the necessary NSEC records or contained duplicate NSEC records when both wildcard expansion and CNAME chaining were required to prepare the response. This has been fixed. [GL #2759] * A bug that caused the NSEC3 salt to be changed on every restart for zones using KASP has been fixed. [GL #2725] OBS-URL: https://build.opensuse.org/request/show/909186 OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=326
2021-07-29 15:39:41 +02:00
-----BEGIN PGP SIGNATURE-----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=7G5u
-----END PGP SIGNATURE-----